This rule ensures no access key exists for the 'root' user account.
Rule | Ensure no 'root' user account access key exists |
Framework | cis_v140 |
Severity | ✔ High |
Ensure No 'Root' User Account Access Key Exists for CIS v1.4.0
The Center for Internet Security (CIS) Amazon Web Services Foundations Benchmark v1.4.0 contains a recommendation to ensure that the 'root' user's access keys are not used and do not exist. The root account has full access to all resources in the AWS account, and it is a best practice to only use the root account to perform a limited number of tasks that cannot be done with other types of credentials.
Description of the Rule
The rule is aimed at improving the security of AWS accounts by eliminating the risk associated with misuse or compromise of root user access keys. Secure management of root access keys includes deleting and not creating new keys for the root user account.
Troubleshooting Steps
If an access key for the root user is detected, the following steps can inform you on how to remove it:
Remediation Steps
CLI Command for Remediation
To programmatically identify and remove the root user's access keys, AWS CLI can be used.
List Access Keys for the Root Account:
aws iam list-access-keys --user-name root
Delete the Root User Access Key:
aws iam delete-access-key --access-key-id [ACCESS_KEY_ID] --user-name root
Replace
[ACCESS_KEY_ID]
with the actual access key ID you intend to delete. This action cannot be reversed.Additional Security Measures and Best Practices
By following these guidelines and incorporating them into your cloud security posture, you help ensure that the root user account remains secure and minimize the potential for unauthorized access and activities within your AWS environment. This adherence to best practices also enhances the SEO of the information by presenting a focused and authoritative content on security practices.